Debugging and Tracing in ASP.NET AJAX

Sometimes while you're developing an application you need to track potential errors that can creep in post-deployment. Debugging and tracing are two features that come in handy for tracking such errors. In the case of ASP.NET AJAX applications, debugging is a challenge because these applications contain a mix of server-side and client-side code. The client-side code can contain scripts, styles, HTML markups, etc.

However, you can overcome these obstacles and continue to debug and trace your ASP.NET AJAX applications much the same way you debug and trace an ASP.NET application. The Sys.Debug class in the Sys namespace contains a list of methods that you can use to debug your ASP.NET AJAX application, handle trace output, and display the trace messages.

In his WebReference article, Joydip Kanjilal explains these built-in debugging and tracing features and how you can work with them in your ASP.NET Ajax applications.


Read the full story at WebReference:
Debugging and Tracing in ASP.NET Ajax



About the Author

Joydip Kanjilal

Microsoft Most Valuable Professional, Author and Speaker. Featured in "MSDN Featured Developer of the Fortnight (India)" a number of times. Winner of Community Credit Awards at www.community-credit.com several times. Authored numerous books and articles in Microsoft .NET and its related technologies. Authored the following books:-- ASP.NET 4.0 Programming (Mc-Graw Hill Publishing) Entity Framework Tutorial (Packt Publishing) Pro Sync Framework (APRESS) Sams Teach Yourself ASP.NET Ajax in 24 Hours (Sams Publishing) ASP.NET Data Presentation Controls Essentials (Packt Publishing)

Comments

  • There are no comments yet. Be the first to comment!

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • This paper introduces IBM Java on the IBM PowerLinux 7R2 server and describes IBM's implementation of the Java platform, which includes IBM's Java Virtual Machine and development toolkit.

  • Targeted attacks and advanced threats are customized to infiltrate your unique IT infrastructure, evade conventional defenses, and remain hidden while stealing your corporate data. To detect these criminal intrusions, analysts and security experts agree that organizations should deploy advanced threat protection as part of an expanded security monitoring strategy. For this comparative analysis of breach detection systems, product analysis reports and comparative analysis reports are used to create the security …

Most Popular Programming Stories

More for Developers

Latest Developer Headlines

RSS Feeds